Analysis

  • max time kernel
    132s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 19:17

General

  • Target

    9de40f73e3f1364ef2754e81d973c6d05f4c3ac1e0b7c9fe9518e36f1ef33c2a.exe

  • Size

    521KB

  • MD5

    91f4ad6c3dbf278937e62ef1d239db77

  • SHA1

    d1d40fba83b7273fd14a7bf24778a67d5e037b5c

  • SHA256

    9de40f73e3f1364ef2754e81d973c6d05f4c3ac1e0b7c9fe9518e36f1ef33c2a

  • SHA512

    884e07faabe84c8419e61d9bc439efd4bba3f01db42eaa8d36c5640e3f17b938812946ab2db15b7c3c4fdafa787f6ad297c925ddd17a81a525e94d7d3572f8da

  • SSDEEP

    12288:RMrjy90YkuKK5uXvlNxBx9s6bS0l60wbpOP:yyUxzs6Ns0T

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9de40f73e3f1364ef2754e81d973c6d05f4c3ac1e0b7c9fe9518e36f1ef33c2a.exe
    "C:\Users\Admin\AppData\Local\Temp\9de40f73e3f1364ef2754e81d973c6d05f4c3ac1e0b7c9fe9518e36f1ef33c2a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4696
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwg8983.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwg8983.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2148
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr396878.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr396878.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1292
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku518077.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku518077.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1556
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1556 -s 1352
          4⤵
          • Program crash
          PID:768
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr448744.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr448744.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4480
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1556 -ip 1556
    1⤵
      PID:4616
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start wuauserv
      1⤵
      • Launches sc.exe
      PID:3112

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr448744.exe

      Filesize

      175KB

      MD5

      f031eb34ddd698a2dc82280d43cd87e2

      SHA1

      ed580e673be25151de29292719743a1761437c85

      SHA256

      7790777cf13c01f61ff7e1ba397a7c045578ae46e4626a29416213f9dccd49c5

      SHA512

      145acb8b996b138bdfd2458ead0a25608568e853adf862653278b595c3d74570d7d438fe0a8b52a4ba5dc30cabe41153dc53e0b1c3b569eb165739841b835324

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr448744.exe

      Filesize

      175KB

      MD5

      f031eb34ddd698a2dc82280d43cd87e2

      SHA1

      ed580e673be25151de29292719743a1761437c85

      SHA256

      7790777cf13c01f61ff7e1ba397a7c045578ae46e4626a29416213f9dccd49c5

      SHA512

      145acb8b996b138bdfd2458ead0a25608568e853adf862653278b595c3d74570d7d438fe0a8b52a4ba5dc30cabe41153dc53e0b1c3b569eb165739841b835324

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwg8983.exe

      Filesize

      379KB

      MD5

      976426e4755e69a7310c093290718584

      SHA1

      4e10163d7fa94bd77ef254eec079bb90f9c37e95

      SHA256

      53f1ac4142900796ad51fe500a4e7c9c9047809f69498915a9c5fba2a7d265b9

      SHA512

      d25205691aff5216777efc451473df2794009437bb0aec7badc6daa6b2aa2bfc86ab5c2b64fa0beed4e64c00fd209b0c5c2855d58be5f3ce2f1ddd15d68ecb8b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwg8983.exe

      Filesize

      379KB

      MD5

      976426e4755e69a7310c093290718584

      SHA1

      4e10163d7fa94bd77ef254eec079bb90f9c37e95

      SHA256

      53f1ac4142900796ad51fe500a4e7c9c9047809f69498915a9c5fba2a7d265b9

      SHA512

      d25205691aff5216777efc451473df2794009437bb0aec7badc6daa6b2aa2bfc86ab5c2b64fa0beed4e64c00fd209b0c5c2855d58be5f3ce2f1ddd15d68ecb8b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr396878.exe

      Filesize

      11KB

      MD5

      bf41791ec502a80e498da916c9b37da4

      SHA1

      72a623f9c01a63c12c5cae1a3cba1df1b3ce2e5e

      SHA256

      3768ed5fd6e4f4767846342e9a3acd616d5cfa4c33718dd1a4d61a353674e348

      SHA512

      8605aa607e9f73f2a2f4e6b3f94e7ec2122dc813b07b4604724242f53f7e7238f440ed8d20af2f93377b964ee15c6d6155cfa50cf02a86168ce10e70b3556cc5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr396878.exe

      Filesize

      11KB

      MD5

      bf41791ec502a80e498da916c9b37da4

      SHA1

      72a623f9c01a63c12c5cae1a3cba1df1b3ce2e5e

      SHA256

      3768ed5fd6e4f4767846342e9a3acd616d5cfa4c33718dd1a4d61a353674e348

      SHA512

      8605aa607e9f73f2a2f4e6b3f94e7ec2122dc813b07b4604724242f53f7e7238f440ed8d20af2f93377b964ee15c6d6155cfa50cf02a86168ce10e70b3556cc5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku518077.exe

      Filesize

      294KB

      MD5

      fdb76badb3522b2636c91f9946e78e2b

      SHA1

      f7ef2d8c70a568e2661f71c5575f513a59bad17b

      SHA256

      273d6c05eb8e3f55bfa812f0fa05433170105a1661ced2d3807e377b61f4f51a

      SHA512

      4ca083ac5b8cb5f866042887b394db6f61b901e6fa7cdca7eeadc5dd65774ce9fa80f6e9c66a524df2bd34a85d9b0db361261a4eb285f165b0b3f5831094004e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku518077.exe

      Filesize

      294KB

      MD5

      fdb76badb3522b2636c91f9946e78e2b

      SHA1

      f7ef2d8c70a568e2661f71c5575f513a59bad17b

      SHA256

      273d6c05eb8e3f55bfa812f0fa05433170105a1661ced2d3807e377b61f4f51a

      SHA512

      4ca083ac5b8cb5f866042887b394db6f61b901e6fa7cdca7eeadc5dd65774ce9fa80f6e9c66a524df2bd34a85d9b0db361261a4eb285f165b0b3f5831094004e

    • memory/1292-147-0x0000000000550000-0x000000000055A000-memory.dmp

      Filesize

      40KB

    • memory/1556-153-0x0000000000780000-0x00000000007CB000-memory.dmp

      Filesize

      300KB

    • memory/1556-154-0x0000000004BC0000-0x0000000005164000-memory.dmp

      Filesize

      5.6MB

    • memory/1556-155-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

      Filesize

      64KB

    • memory/1556-156-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

      Filesize

      64KB

    • memory/1556-157-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-158-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-160-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-162-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-164-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-166-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-170-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-168-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-172-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-174-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-176-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-178-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-180-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-182-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-184-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-186-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-188-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-190-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-192-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-194-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-196-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-198-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-200-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-202-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-204-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-206-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-208-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-210-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-212-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-214-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-216-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-218-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-220-0x0000000004A80000-0x0000000004ABF000-memory.dmp

      Filesize

      252KB

    • memory/1556-1063-0x0000000005170000-0x0000000005788000-memory.dmp

      Filesize

      6.1MB

    • memory/1556-1064-0x0000000005790000-0x000000000589A000-memory.dmp

      Filesize

      1.0MB

    • memory/1556-1065-0x00000000058A0000-0x00000000058B2000-memory.dmp

      Filesize

      72KB

    • memory/1556-1066-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

      Filesize

      64KB

    • memory/1556-1067-0x00000000058C0000-0x00000000058FC000-memory.dmp

      Filesize

      240KB

    • memory/1556-1069-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

      Filesize

      64KB

    • memory/1556-1070-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

      Filesize

      64KB

    • memory/1556-1071-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

      Filesize

      64KB

    • memory/1556-1072-0x0000000005BB0000-0x0000000005C42000-memory.dmp

      Filesize

      584KB

    • memory/1556-1073-0x0000000005C50000-0x0000000005CB6000-memory.dmp

      Filesize

      408KB

    • memory/1556-1074-0x0000000006590000-0x0000000006606000-memory.dmp

      Filesize

      472KB

    • memory/1556-1075-0x0000000006620000-0x0000000006670000-memory.dmp

      Filesize

      320KB

    • memory/1556-1076-0x00000000066A0000-0x0000000006862000-memory.dmp

      Filesize

      1.8MB

    • memory/1556-1077-0x0000000006870000-0x0000000006D9C000-memory.dmp

      Filesize

      5.2MB

    • memory/1556-1078-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

      Filesize

      64KB

    • memory/4480-1084-0x0000000000B30000-0x0000000000B62000-memory.dmp

      Filesize

      200KB

    • memory/4480-1085-0x0000000005780000-0x0000000005790000-memory.dmp

      Filesize

      64KB